Basic test for "openssl req -precert" via apps/CA.pl
TODO(robpercival): Should actually test that the output certificate contains the poison extension. Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/843)
This commit is contained in:
parent
b6486bf749
commit
caee75d2c6
1 changed files with 5 additions and 1 deletions
|
@ -22,7 +22,7 @@ my $std_openssl_cnf =
|
|||
|
||||
rmtree("demoCA", { safe => 0 });
|
||||
|
||||
plan tests => 4;
|
||||
plan tests => 5;
|
||||
SKIP: {
|
||||
$ENV{OPENSSL_CONFIG} = '-config "'.srctop_file("test", "CAss.cnf").'"';
|
||||
skip "failed creating CA structure", 3
|
||||
|
@ -41,6 +41,10 @@ plan tests => 4;
|
|||
|
||||
ok(run(perlapp(["CA.pl", "-verify", "newcert.pem"])),
|
||||
'verifying new certificate');
|
||||
|
||||
$ENV{OPENSSL_CONFIG} = "-config ".srctop_file("test", "Uss.cnf");
|
||||
ok(run(perlapp(["CA.pl", "-newprecert"], stderr => undef)),
|
||||
'creating new pre-certificate');
|
||||
}
|
||||
|
||||
|
||||
|
|
Loading…
Reference in a new issue